Category Archives: bad business practices

Whois scamboard.com? reportdeadbeats.com?

The site operators are the same individuals that created http://www.predatorswatch.com whose name have been altered on one of their bogus sites The DatingJudge.com and you can read complaints  Dividedstates.comThe Dating Judge and Ripoffreport.com.

A psychopath and dangerous individual.

scamboard2

Address lookup
canonical name reportdeadbeats.com
aliases
addresses 209.141.39.215
Domain Whois record

Queried whois.internic.net with “dom reportdeadbeats.com”…

Domain Name: REPORTDEADBEATS.COM
Registrar: GODADDY.COM, LLC
Sponsoring Registrar IANA ID: 146
Whois Server: whois.godaddy.com
Referral URL: http://www.godaddy.com

Name Server: NS1.LIARSANDCHEATERS.COM
Name Server: NS2.LIARSANDCHEATERS.COM

Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Updated Date: 02-feb-2016
Creation Date: 19-sep-2015
Expiration Date: 19-sep-2016

Last update of whois database: Wed, 06 Jul 2016 01:46:01 GMT

For more information on Whois status codes, please visit https://icann.org/epp
Queried whois.godaddy.com with “reportdeadbeats.com”…

Domain Name: reportdeadbeats.com
Registry Domain ID: 1961622773_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com

Update Date: 2015-09-19T02:24:13Z
Creation Date: 2015-09-19T02:24:13Z

Registrar Registration Expiration Date: 2016-09-19T02:24:13Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.4806242505

Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited

Registry Registrant ID: Not Available From Registry
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Registrant Street: DomainsByProxy.com
Registrant Street: 14747 N Northsight Blvd Suite 111, PMB 309
Registrant City: Scottsdale
Registrant State/Province: Arizona
Registrant Postal Code: 85260
Registrant Country: US
Registrant Phone: +1.4806242599
Registrant Fax: +1.4806242598
Registrant Email: reportdeadbeats.com@domainsbyproxy.com
Registry Admin ID: Not Available From Registry

Admin Name: Registration Private
Admin Organization: Domains By Proxy, LLC
Admin Street: DomainsByProxy.com
Admin Street: 14747 N Northsight Blvd Suite 111, PMB 309
Admin City: Scottsdale
Admin State/Province: Arizona
Admin Postal Code: 85260
Admin Country: US
Admin Phone: +1.4806242599
Admin Fax: +1.4806242598
Admin Email: reportdeadbeats.com@domainsbyproxy.com

Registry Tech ID: Not Available From Registry
Tech Name: Registration Private
Tech Organization: Domains By Proxy, LLC
Tech Street: DomainsByProxy.com
Tech Street: 14747 N Northsight Blvd Suite 111, PMB 309
Tech City: Scottsdale
Tech State/Province: Arizona
Tech Postal Code: 85260
Tech Country: US
Tech Phone: +1.4806242599
Tech Fax: +1.4806242598
Tech Email: reportdeadbeats.com@domainsbyproxy.com

Name Server: NS1.LIARSANDCHEATERS.COM
Name Server: NS2.LIARSANDCHEATERS.COM
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/

Last update of WHOIS database: 2016-07-06T01:00:00Z

For more information on Whois status codes, please visit https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
Network Whois record

Queried whois.arin.net with “n 209.141.39.215″…

NetRange: 209.141.32.0 – 209.141.63.255
CIDR: 209.141.32.0/19
NetName: PONYNET-04
NetHandle: NET-209-141-32-0-1
Parent: NET209 (NET-209-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS53667
Organization: FranTech Solutions (SYNDI-5)
RegDate: 2011-01-27
Updated: 2012-03-25
Ref: https://whois.arin.net/rest/net/NET-209-141-32-0-1

OrgName: FranTech Solutions
OrgId: SYNDI-5
Address: 1621 Central Ave
City: Cheyenne
StateProv: WY
PostalCode: 82001
Country: US
RegDate: 2010-07-21
Updated: 2012-10-01
Ref: https://whois.arin.net/rest/org/SYNDI-5

OrgAbuseHandle: FDI19-ARIN
OrgAbuseName: Dias, Francisco
OrgAbusePhone: +1-778-977-8246
OrgAbuseEmail: admin@frantech.ca
OrgAbuseRef: https://whois.arin.net/rest/poc/FDI19-ARIN

OrgTechHandle: FDI19-ARIN
OrgTechName: Dias, Francisco
OrgTechPhone: +1-778-977-8246
OrgTechEmail: admin@frantech.ca
OrgTechRef: https://whois.arin.net/rest/poc/FDI19-ARIN
DNS records

name class type data time to live
reportdeadbeats.com IN SOA
server: ns1.liarsandcheaters.com
email: admin@stdregistry.com
serial: 2016050401
refresh: 3600
retry: 7200
expire: 1209600
minimum ttl: 86400
86400s (1.00:00:00)
reportdeadbeats.com IN NS ns2.liarsandcheaters.com 86400s (1.00:00:00)
reportdeadbeats.com IN NS ns1.liarsandcheaters.com 86400s (1.00:00:00)
reportdeadbeats.com IN A 209.141.39.215 14400s (04:00:00)
reportdeadbeats.com IN MX
preference: 0
exchange: reportdeadbeats.com
14400s (04:00:00)
215.39.141.209.in-addr.arpa IN PTR . 60s (00:01:00)
39.141.209.in-addr.arpa IN NS rdns1.buyvm.net 60s (00:01:00)
39.141.209.in-addr.arpa IN SOA
server: ns1.frantech.ca
email: admin@frantech.ca
serial: 1
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 3600
86400s (1.00:00:00)
39.141.209.in-addr.arpa IN NS rdns2.buyvm.net 60s (00:01:00)
Traceroute

Tracing route to reportdeadbeats.com [209.141.39.215]…

hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.210 ae6.bbr01.eq01.dal03.networklayer.com
4 28 28 28 173.192.18.141 ae0.bbr01.cs01.lax01.networklayer.com
5 31 31 31 206.223.123.136 lax-eqx-01gw.voxility.net
6 * * *
7 35 36 32 5.254.110.1 filter-ddos
8 * * *
9 * * *
10 * * *
11 * * *
Trace aborted

— end —
URL for this output | return to CentralOps.net, a service of Hexillion

The following A records are set to 209.141.39.215:

  1. badbizreport.com
  2. badboydirectory.com
  3. badboyescort.com
  4. blacklistreport.com
  5. cheatersrus.com
  6. deadbeatregistry.com
  7. godaddyrus.com
  8. gotrevenge.com
  9. liarcheatersrus.com
  10. ns2.liarsandcheaters.com
  11. predatorslist.com
  12. predatorswatch.com
  13. reportdeadbeats.com
  14. reportmyex.com
  15. scamboard.com
  16. scamfound.com
  17. stdregistry.com
  18. valleymetalrecyclinginc.com

Cybercriminal Albert Ahdoot ~ Colocation America

Colocation America Corporation, a Nevada Corporation owned and operated by one Albert A. Ahdoot aka Albert Ahdoot dba Colocation America ColocationUSA dba Colocation America, Inc, license have been FORFEITED by the Secretary of State

Albert Ahdoot is part of a network infrastructure of IT professionals whose business practices are suspect.

His so-called Perry Mason sleazeball Attorney Paul Sigelman notoriety is to FIX lawsuits.

Attorney Richard Morse representing Albert A. Ahdoot dba Colocation America Corporation, Colocation America, Inc., Colocation America, Colocation America now Collocation America send us a threat letter.

Albert Ahdoot was accused of being a serial spammer by Earthlink and is a threat to the global internet infrastructure based on his business practices.

WebHostingTalkwells fargoWells Fargo Complaint-Colocation America

Richard Morse
Entertainment Attorney
13935 Tahiti Way Suite 337
Marina Del Rey, CA

Dear scamFRAUDalert,

I’m tied up with an urgent family matter for the rest of the day and tomorrow, so I have neither the time nor the patience to explain this more than once.
Your DDOS attack (http://en.wikipedia.org/wiki/Denial-of-service_attack) which caused Colocation America, Multacom and Cogent Communications to go down for more than an hour, cost the three companies over $250K in revenue due to their lines being SHUT OFF! You are liable for this. This is in direct violation of your AUP http://colocationamerica.com/aup.htm as clearly stated in your contract. I am being provided receipts from every customer who has to be refunded. You are in breach of your 1 year contract where he owes us the remainder of it. You and ScamAFraudlert.com must immediately stand down in your postings. They must be taken down now.

You need to speak to a criminal attorney immediately to gauge your exposure, I am not your attorney and cannot so advise you. If you and your attorney wish to work out any type of accommodation with me, it can only happen with you immediately ceasing and desisting. You need to provide notice of that within the hour.

THE INDUSTRY PRACTICES Standard Level Agreement (SLA) Mr. ALBERT ARASH AHDOOT or Albert A. Ahdoot dba Colocation America aka Colocation America, Inc. aka Colocation America Corporation refer to SLA as Legal Agreement A clue for what you are up against.

Richard Morse
Entertainment Attorney
13935 Tahiti Way Suite 337
Marina Del Rey, CA

This sleazeball Attorney Paul Sigelman is now saying that his client Albert A. Ahdoot dba Colocation America is a private citizen whose business activities as a reseller of colocation services to the general public online and lying to customers about the services being offer is not a matter of public concern. Paul Sigelman legal argument

In essence Paul Sigelman is saying that the public has no rights to know about his client past business practices.

  1. Colocation America – Demand Letter
  2. Colocation America – Better Business Complaints Las Vegas
  3. Colocation America Threat Letter – Richard Morse
  4. Legal Document Relating to Colocation America
  5. Letter From Attorney Paul S. Sigelman – Sigelmanlaw.com
  6. Attorney Paul Sigelman Letter – PAUL S. SIGELMAN LAW FIRM
  7. Paul Sigelmam Law Firm – Colocation America – 1st Complaint
  8. Paul Sigeglman Law Firm – Colocation Ammerica – 2nd Complaint
  9. Defendant – scamFRAUDalert Answer – 2nd Complaint
  10. Court Ruling – 2nd Complaint
  11. Paul Sigelman Law Firm – Colocaiton America – APPEAL BRIEFING
  12. Appelle – Respondent scamFRAUDalert – ANSWER BRIEFING
  13. Appellant’s Reply Brief ~ utterly nonsense
  14. Appellate Ruling – Affirmed
  15. Motion For Attorney Fees $133,000

Colocation America ~ Colocation America Inc ~ Collocation America

    • colocation america albert Ahdoot
    • colocation review
    • colocation americe review
    • Colocation Los Angeles
    • colocation america inc
    • Los Angeles Colocation
    • Colocation san francisco
    • colocation usa
    • colocation new york
    • colocation america hosting reviews
    • colocation america uptime
    • colocation america web hosting
    • colocation america corporation
    • colocation america inc
    • data centers colocation america
    • carrier neutral colocation america
    • colocation hosting Los Angeles
    • colocation america albert
    • Colocation Southern California
    • Colocation LA

ROKSO-200-worst-spammers

(213) 928-6929

Colocation America, Inc.
Review for Multiple Locations

  1. Colocation America, Inc.
    530 West 6th Street Suite 903
    Los Angeles, CA 90014
  2. Colocation America, Inc.
    600 West 7th Street
    Los Angeles, CA 90017
  3. Colocation America, Inc.
    624 South Grand Avenue
    Los Angeles, CA 90017
  4. Colocation America, Inc.
    650 South Grand Avenue
    Los Angeles, CA 90017
  5. Colocation America, Inc.
    707 Wilshire Avenue
    Los Angeles, CA 90017
  6. Colocation America, Inc.
    9360 W Flamingo Rd # 110-178
    Las Vegas, NV 89147-6426

Colocation America, Inc. aka UnitedLayer.com
530 West 6th Street Suite 903
Los Angeles, CA 90014

Colocation America, Inc.
600 West 7th Street
Los Angeles, CA 90017

Colocation America, Inc.
624 South Grand Avenue
Los Angeles, CA 90017

Colocation America, Inc. aka UnitedLayer.com
650 South Grand Avenue
Los Angeles, CA 90017

Colocation America, Inc. aka Multacom.com
707 Wilshire Avenue
Los Angeles, CA 90017

Colocation America, Inc. ~ Unknown
9360 W Flamingo Rd # 110-178
Las Vegas, NV 89147-6426

Los Angeles Data Centers:

Aon Center : 707 Wilshire Blvd. Los Angeles, CA 90017
One Wilshire: 624 S. Grand Ave. Los Angeles, CA 90017
Digital Realty Trust: 600 W. 7th St. Los Angeles, CA 90017
Quinby Building: 650 S. Grand Ave. Los Angeles, CA 90017
Telecom Center: 530 W. 6th St. Los Angeles, CA 90014

San Francisco Data Centers:

200 Paul Exchange: 200 Paul St. San Francisco, CA 94110

New York Data Centers:

60 Hudson Building: 60 Hudson Ave. New York, NY 10013

New Jersey Data Centers:

100 Delawanna Buiding:100 Delawanna Ave. Clifton, NJ 0701

Chicago Data Centers:

  • 350 E Cermak Rd. Chicago, IL 60616
  • 701 S Lasalle St. Chicago, IL 60605
  • 725 S Wells St. Chicago, IL 60607
  • 427 S Lasalle St. Chicago, IL 60605
  • 717 S Wells St. Chicago, IL 60607
  • 601 W Polk St. Chicago, IL 60607
  • 600 W Chicago Ave Chicago, IL 60654
  • 1331 E Business Center Dr. Mt Prospect, IL 60056
  • 800 E. Business Center Dr. Mt. Prospect, IL 60056
  • 1850 Springer Dr. Lombard, IL 60148
  • 1808 Swift Dr. Oakbrook, IL 60523
  • 360 E 22nd St. Lombard, IL 60148
  • 2425 Busse Rd. Arlington Heights, IL 60005
  • 1905 Lunt Ave. Elk Grove Village, IL 6000

Colocation America and UnitedLayer Management Ownership

  • Arman Khalili is currently the Founder, CEO and co-owner.
  • Peter Preuss[8] – Director of Systems Architecture and co-owner
  • Otto Grajeda [9]- Founder and co-owner
  • Albert A. Ahdoot – [10]- co-owner

UK Redstation Malware Haven

Money Mules/Malwares Hosting Provider A sanctuary For Cybercriminals

This  hosting company (data center) is hosting several of the money mule  and malwares sites we are encountering.scamalert
IP 109.73.77.82 = AS35662 = REDSTATION Redstation Limited

Postal address:
Redstation Limited
2 Frater Gate Business Park
Aerodrome Road
Gosport
Hampshire
PO13 0GW
UNITED KINGDOM

Telephone:
Enquiries: 0800 622 6655
24/7 Support: 0800 987 5640
International Enquiries: +44 1329 828224
International Support: +44 1329 243123

Name Server: NS1.MERXS.SU
Name Server: NS2.WERMO.SU
Name Server: NS3.MARSO.CC

Calling from abroad

From overseas please call us on +44 1329 828224 or for technical support call +44 1329 243123

To discuss your requirements call us on: 0800 622 6655 or email sales@redstation.com

Address lookup

canonical name http://www.redstation.com

aliases
addresses 149.3.142.10

Domain Whois record
Queried whois.internic.net with “dom redstation.com

Domain Name: REDSTATION.COM
Registrar: TUCOWS DOMAINS INC.

Whois Server: whois.tucows.com

Referral URL: http://domainhelp.opensrs.net
Name Server: DNS1.REDSTATION.CO.UK
Name Server: DNS2.REDSTATION.CO.UK

Status: clientTransferProhibited
Status: clientUpdateProhibited

Updated Date: 15-oct-2010
Creation Date: 21-sep-1999
Expiration Date: 21-sep-2020

Last update of whois database: Sat, 15 Jun 2013 00:45:19 UTC
Queried whois.tucows.com with “redstation.com”…

Registrant:
RACKCENTRE LIMITED
Wentworth House
4400 Parkway
Whiteley, Hampshire PO15 7FJ
GB

Domain name: REDSTATION.COM
Administrative Contact:
Admin, DNS admin@redstation.com
2 Frater Gate Business Park
Aerodrome Road
Gosport, Hampshire PO13 0GW
GB
+44.1329828224

Technical Contact:
Administrator, DNS admin@redstation.com
2 Frater Gate Business Park
Aerodrome Road
Gosport, Hampshire PO13 0GW
GB
+44.1329828224

Registration Service Provider:
Redstation Limited, admin@redstation.com
+44 1329 828224
http://www.redstation.com
Registrar of Record: TUCOWS, INC.
Record last updated on 12-Jun-2013

Record expires on 21-Sep-2020
Record created on 21-Sep-1999

Registrar Domain Name Help Center:
http://tucowsdomains.com

Domain servers in listed order:
DNS1.REDSTATION.CO.UK
DNS2.REDSTATION.CO.UK

Domain status: clientTransferProhibited

clientUpdateProhibited

Network Whois record
Queried whois.ripe.net with “-B 149.3.142.10″…

Information related to ‘149.3.142.8 – 149.3.142.11’

Abuse contact for ‘149.3.142.8 – 149.3.142.11’ is ‘abuse@redstation.com’

inetnum: 149.3.142.8 – 149.3.142.11

netname: REDSTATIONWEB
descr: Redstation Limited
descr: Web Server Network

country: GB
admin-c: RA1415-RIPE
tech-c: RA1415-RIPE
status: ASSIGNED PA
remarks: ABUSE REPORTS: abuse@redstation.com

mnt-by: REDSTATION-MNT
mnt-domains: REDSTATION-MNT
mnt-routes: REDSTATION-MNT

changed: ripe-admin@redstation.com 20110928
source: RIPE

role: Redstation Admin Role
address: Redstation Limited
address: 2 Frater Gate Business Park
address: Aerodrome Road
address: Gosport
address: Hampshire
address: PO13 0GW
address: UNITED KINGDOM

abuse-mailbox: abuse@redstation.com
e-mail: ripe-admin@redstation.com

admin-c: KMAC-RIPE
tech-c: PA5242-RIPE
nic-hdl: RA1415-RIPE
mnt-by: REDSTATION-MNT
changed: ripe-admin@redstation.com 20080625
source: RIPE

Information related to ‘149.3.140.0/22AS35662
route: 149.3.140.0/22

descr: FTIP002960302 Redstation Limited
origin: AS35662

mnt-by: REDSTATION-MNT
changed: kevinmcardle@redstation.com 20110725
source: RIPE

% This query was served by the RIPE Database Query Service version 1.66.3 (WHOIS3)

DNS records
name class type data time to live
http://www.redstation.com IN A 149.3.142.10 60s (00:01:00)
redstation.com IN A 149.3.142.10 60s (00:01:00)
redstation.com IN NS dns2.redstation.co.uk 60s (00:01:00)
redstation.com IN NS dns1.redstation.co.uk 60s (00:01:00)
redstation.com IN SOA

server: dns1.redstation.co.uk
email: admin@redstation.co.uk
serial: 158
refresh: 300
retry: 600
expire: 600
minimum ttl: 60
60s (00:01:00)
redstation.com IN MX
preference: 5
exchange: mail.redstation.com
60s (00:01:00)

redstation.com IN TXT v=spf1 ip4:80.84.48.0/23 a mx include:redstationmail.co.uk -all 60s (00:01:00)

10.142.3.149.in-addr.arpa IN PTR http://www.redstation.com 3600s (01:00:00)
142.3.149.in-addr.arpa IN SOA

server: dns3.redstation.co.uk
email: admin@redstation.co.uk

serial: 2007071361
refresh: 1200
retry: 600
expire: 1728000
minimum ttl: 3600
3600s (01:00:00)
142.3.149.in-addr.arpa IN RRSIG
type covered: NSEC (47)
algorithm: RSA/SHA-1 (5)
labels: 5
original ttl: 10800 (03:00:00)
signature expiration: 2013-06-24 20:00:12Z
signature inception: 2013-06-14 20:00:12Z
key tag: 3017
signer’s name: 149.in-addr.arpa
signature:
(1024 bits)

382516B2216BDE33D981DCEDA76B87DD
1974F44B93E982D05DE48AAE9F5C72F8
766283F9AE625E7F88073A23F55201BD
23BB04DF6B49F068A74F989095785E57
90C88856976CD6DC3E926624FF522AF4
4DD68AE7CF785FB5600F7C0B05273B2B
BBDDD9712CDB6AB79C74862B2044AF8E
306AF43B46176656953F00F1210E8C7D

10800s (03:00:00)
142.3.149.in-addr.arpa IN NSEC
next domain name: 143.3.149.in-addr.arpa
record types: NS RRSIG NSEC
10800s (03:00:00)
142.3.149.in-addr.arpa IN NS dns3.redstation.co.uk 3600s (01:00:00)
142.3.149.in-addr.arpa IN NS dns2.redstation.co.uk 3600s (01:00:00)

Traceroute
Tracing route to http://www.redstation.com [149.3.142.10]
hop rtt rtt rtt ip address fully qualified domain name
1 1 1 1 70.84.211.97 61.d3.5446.static.theplanet.com
2 1 0 0 70.87.254.5 po101.dsr02.dllstx5.networklayer.com
3 122 3 1 70.85.127.109 po52.dsr02.dllstx3.networklayer.com
4 0 0 0 173.192.18.230 ae17.bbr02.eq01.dal03.networklayer.com
5 20 20 20 173.192.18.135 ae1.bbr01.tl01.atl01.networklayer.com
6 33 33 33 173.192.18.152 ae0.bbr01.eq01.wdc02.networklayer.com
7 34 38 53 173.192.18.195 ae7.bbr02.eq01.wdc02.networklayer.com
8 113 113 113 50.97.18.215 ae0.bbr01.eq01.ams02.networklayer.com
9 189 222 211 195.69.147.48
10 114 114 114 109.200.17.234 34-17-200-109.rackcentre.redstation.net.uk
11 120 119 120 109.200.17.250 50-17-200-109.rackcentre.redstation.net.uk
12 114 114 114 149.3.142.10 http://www.redstation.com
Trace complete

— end —
Related Article:

Wikiwarnings

The operator of PredatorsWatch.com, Potentialprostitute.com and PotentialPredators is back at harvesting PUBLIC RECORDS of DEADBEAT DADS and publishing such information online for the sole purpose of EXTORTION.
This individual Michael Wayne King of Miami, Florida and his accomplices from INDIA, Los Angeles, CA, Raleigh, North Carolina, Houston, Texas and across the GLOBE see harvesting public record of individuals such as arrest, delinquent child support payments, and those individuals that use craigslist or the internet to find champions a GOLD MINE and lucrative business of EXTORTION.

Harvest public records of people and post the information online. Require payments for removal. His so called consumer website wikiwarnings.com is a camouflage for his true motives.

This slideshow requires JavaScript.

google2_wikiwarnings
mediationProgram

WhoIs ~ www.123people.com

Public Threat Alert – 123people.com

scamFRAUDalert believe websites that harvest public records database and sell the harvested information are a public threat.

Why? Because individual private records regardless of it in the public domain are being sold to someone adversary or to some criminal organization.

The sale of people private records is a practice that law makers and law enforcement need to pay keen attention. This business model is a CLEAR and PRESENT DANGER to our privacy and a threat to humanity.

These business practices Are A Threat To The Global Internet Infrastructure

_________________________

whois

I stumbled across this rather dubious site called 123people.com who have crudely used robots to scrape public information about me and the hundreds of other people who shared my name or second name. In my opinion, we must mobilise and see them charged, convicted and jailed for a range of data protection, libel and consequential damages crimes. A simple search for 123people complaints that excludes their site finds 2.3 million hits. Something’s wrong.

While the items of information they have aggregated about me is, or was correct and was at least once public, it was previously in context. I had placed this information on trusted websites like LinkedIn where it accurately presented my credentials but not at 123people.com.

They have haphazardly interlinked my web presence with that of others with a similar name, regardless of sex. For example, a woman with my second name and 19 positive criminal record searches which reads like we are related and an advertisement for a male hooker and a punk rocker from my old town. Despite sourcing much of this mash-up from LinkedIn, they proudly announce that I have no professional linkages which also transmits a completely inaccurate picture.

After a number of difficult attempts, I have marked all my links to 123people for removal and will give them a few days to act. If they have not corrected this nonsense at that point, I will be looking to lead a significant legal claim against them on behalf of all of us who have been affected. Let me know any interest in providing evidence and legal services.

  1. http://www.ussearch.com
  2. http://www.arrestfiles.org
  3. http://www.usa-people-search.com
  4. http://www.classmates.com
  5. http://www.instantcheckmate.com
  6. http://www.beenverified.com
  7. http://www.mylife.com
  8. http://www.peoplesmart.com
  9. http://www.whitepages.com

Vienna
Linke Wienzeile 8/29
Vienna, 1060, AUT

Markus Wagner @MarkusWagner
I’m a European web 2.0 business incubator Vienna / Austria / Europe ·http://hoteurostartups.wordpress.com

  1. i5invest’s investments include:
  2. 3united AG: (Exit to VeriSign Inc.2006)
  3. 123people.com: (Exit to Pages Jaunes Group 2010)
  4. tripwolf.com: (Joint Venture MairDumont Media Group, Dieter von Holtzbrinck)
  5. tupalo.com: (Joint Venture European Directories Group/Herold)
  6. wikitude GmbH: (Grand Prize Winner of the 2010 NAVTEQ Global LBS Challenge
  7. EMEA, second at Austrian Private Equity & Venture Capital Award 2011)
  8. adaffix GmbH: (Global Mobile Award 2010 for Best Mobile Internet Service)

Paul Weinberger, Chairman of the board
Lukas Zinnagl, Business Development

Russell Perry, CEO
Markus Wagner
Advisory Board
Stefan Kalteis, CEO

Am 05.11.2010 15:48, schrieb ScamFraudAlert:

Dear scamFRAUDalert,

Thank you for your e-mail. We appreciate your feedback and we can assure you that we work very hard to answer your questions regarding data protection laws and regulations.

123people is a free real time search service that finds information that is publicly available on the Internet (i.e. social networking profiles). 123people enables users to check and control their digital footprint and find out what personal information is publicly available on the web.

Please understand that 123people provides a tool to make the search for people related information more convenient. We cannot ensure that information found on the web applies only to one person as the search is related to a name pair, not to a specific person. The more common a name pair is, i.e. “John Smith”, the less specific the information will be.

We do not store any person related profiles or information. This means we are not able to distinguish and separate between different people displayed in our search results, only between names. We comply and are registered under the Austrian Data Protection Laws as we are based in Vienna, Austria.

In every search result there is a certain degree of inaccuracy; results are not often related to a single individual. As we have developed and utilize an automated search technology, a 100% accuracy rate is not possible. We rely on the “human factor”, the user, to make the final distinction of available and relevant information.

If you do not want to be found through 123people, we recommend changing or deleting the inaccurate information that concerns your person from the original source or website. It will therefore disappear from 123people and most other search engines without our intervention. You can use 123people to identify all data sources by looking at your search results. Sources are clearly identified with either a symbol or a text link.

If however you want us to remove information that concerns you explicitly from 123people we are more than happy to follow your request.

Please send us the specific search result links that point directly to the personal information in question.

How to identify your personal links:

1. Search for the requested name pair on 123people.

2. Click on any link in the search result or on the small icon on the bottom left of the thumbnail.

3. Copy the full link displayed in the grey 123people frame within the redirected page or the link provided in the picture thumbnail preview.

4. Send us the links via e-mail along with your full name and we will restrict them on our search service, in compliance with European Guidelines and the Austrian Data Protection Law.

If you would like us to restrict your address or your phone number, please give us the exact link from the source which you can obtain by copying the link location/address (and indicate us the exact address that appears on 123people search results).

How do I copy a link to send it to 123people?

Once you’ve identified the link you would like to send, you must do the following:

– Right click on the link. A menu will appear will some options

– Selection the following option: “Copy Link Location”

– Keep in mind different browsers have slightly different variations on this, but the main text to search for is: “Copy Link…”

With the link copied, you must paste it into the email. To do this, simply create a new email, right click in the message area and select “Paste”.

Please note that although we can restrict a certain link from 123people, the information will continue to exist publicly on the Internet. This means if someone searches for the same name pair on another search engine, the link may continue to appear.

Advice: you can only request link restriction pertaining to your name.

Please visit our web site for detailed information and screenshots about how to identify the links appearing on 123people:

http://www.123people.com/page/reputation

Every month more than 40 million users rely on our people search service. 123people has in many cases been beneficial with people helping them to control and manage their digital footprint, find lost friends and family members or make new business contacts.

Kind regards,

Damian Brooks
Customer Service Specialist

Address lookup
canonical name http://www.123people.com

aliases
addresses 81.16.155.30
Domain Whois record

Queried whois.internic.net with “dom 123people.com

Domain Name: 123PEOPLE.COM
Registrar: PSI-USA, INC. DBA DOMAIN ROBOT
Whois Server: whois.psi-usa.info
Referral URL: http://www.psi-usa.info
Name Server: NS.NEXTLAYER.AT
Name Server: NS2.NEXTLAYER.AT
Status: clientTransferProhibited
Updated Date: 02-jun-2012
Creation Date: 01-jun-2004
Expiration Date: 01-jun-2013

Last update of whois database: Sun, 21 Apr 2013 14:12:12 UTC

Queried whois.psi-usa.info with “123people.com”…

============
PSI-USA, Inc.
============

This is the PSI-USA, Inc. WHOIS server.

All requests are logged.

Requesting IP: 209.200.105.157
requesting URL: http://whois.psi-usa.info
Requesting Object: domain 123people.com
Timestamp: 2013-04-21 16:12:51

You can see the policy that you agree by submitting a query to this server:
whois -h whois.psi-usa.info POLICY

domain: 123people.com
status: LOCK
owner-c: LULU-10182684
admin-c: LULU-10176046
tech-c: LULU-10176046
zone-c: LULU-10176046
nserver: ns.nextlayer.at
nserver: ns2.nextlayer.at
created: 2004-06-02 01:25:43
expire: 2013-06-02 01:25:43 (registry time)
changed: 2012-11-20 07:40:35

[owner-c] handle: 10182684
[owner-c] type: PERSON
[owner-c] title:
[owner-c] fname: Helga
[owner-c] lname: Bernold
[owner-c] org: 123people
[owner-c] address: Stronsdorf 24
[owner-c] city: Stronsdorf
[owner-c] pcode: 2153
[owner-c] country: AT
[owner-c] state: Austria
[owner-c] phone: +43-664-4398603
[owner-c] fax: +43-2526-6710
[owner-c] email: domains@123people.com
[owner-c] protection: B
[owner-c] updated: 2010-03-26 09:53:42

[admin-c] handle: 10176046
[admin-c] type: PERSON
[admin-c] title:
[admin-c] fname: Martin
[admin-c] lname: Stemeseder
[admin-c] org: 123people
[admin-c] address: Linke Wienzeile 8/29
[admin-c] city: Wien
[admin-c] pcode: 1060
[admin-c] country: AT
[admin-c] state: AT
[admin-c] phone: +43-664-4398603
[admin-c] fax: +43-2526-6710
[admin-c] email: domains@123people.com
[admin-c] protection: B
[admin-c] updated: 2010-06-15 12:02:22

[tech-c] handle: 10176046
[tech-c] type: PERSON
[tech-c] title:
[tech-c] fname: Martin
[tech-c] lname: Stemeseder
[tech-c] org: 123people
[tech-c] address: Linke Wienzeile 8/29
[tech-c] city: Wien
[tech-c] pcode: 1060
[tech-c] country: AT
[tech-c] state: AT
[tech-c] phone: +43-664-4398603
[tech-c] fax: +43-2526-6710
[tech-c] email: domains@123people.com
[tech-c] protection: B
[tech-c] updated: 2010-06-15 12:02:22

[zone-c] handle: 10176046
[zone-c] type: PERSON
[zone-c] title:
[zone-c] fname: Martin
[zone-c] lname: Stemeseder
[zone-c] org: 123people
[zone-c] address: Linke Wienzeile 8/29
[zone-c] city: Wien
[zone-c] pcode: 1060
[zone-c] country: AT
[zone-c] state: AT
[zone-c] phone: +43-664-4398603
[zone-c] fax: +43-2526-6710
[zone-c] email: domains@123people.com
[zone-c] protection: B
[zone-c] updated: 2010-06-15 12:02:22

Network Whois record

Queried whois.ripe.net with “-B 81.16.155.30″…

% Information related to ‘81.16.155.0 – 81.16.155.255’

inetnum: 81.16.155.0 – 81.16.155.255
netname: YELSTERDIGITAL-NET
descr: yelster digital gmbh
descr: Linke Wienzeile 8/29
descr: 1060 Vienna
descr: Austria
country: AT
admin-c: NLNC1-RIPE
tech-c: NLNC1-RIPE
status: ASSIGNED PA
mnt-by: AS1764-MNT
changed: daniel.stricks@nextlayer.at 20130116
source: RIPE

role: NOC Next Layer
address: NEXT LAYER Telekommunikationsdienstleistungs-
address: und Beratungs GmbH
address: Mariahilfer Guertel 37/7
address: A-1150 Vienna
phone: +43(0)5 1764 110
fax-no: +43(0)5 1764 9
e-mail: noc@nextlayer.at
org: ORG-NLTU1-RIPE
admin-c: RA773-RIPE
admin-c: TF2679-RIPE
tech-c: RA773-RIPE
tech-c: MD13304-RIPE
tech-c: ASC1764-RIPE
tech-c: CG46
tech-c: SOS-RIPE
tech-c: POWO-RIPE
tech-c: DSTR-RIPE
tech-c: MR10426-RIPE
tech-c: TF2679-RIPE
nic-hdl: NLNC1-RIPE
remarks: —————————————————–
remarks: The NEXT LAYER NOC can be reached during office hours
remarks: between 0900 and 1800 (CET) at +43 5 1764 110. Outside
remarks: these hours, please use the duty-engineer mobile number
remarks: supplied in the handover document or send an email
remarks: to noc@nextlayer.at in non-urgent cases.
remarks: —————————————————–
notify: hostmaster@nextlayer.at
abuse-mailbox: abuse@nextlayer.at
mnt-by: NEXTLAYER-MNT
mnt-by: AS1764-MNT
changed: Rene.Avi@nextlayer.at 20050721
changed: Rene.Avi@nextlayer.at 20060311
changed: silvia.schuckert@nextlayer.at 20060713
changed: andreas.poiss@nextlayer.at 20070213
changed: silvia.schuckert@nextlayer.at 20080422
changed: Rene.Avi@nextlayer.at 20090510
changed: daniel.stricks@nextlayer.at 20120501
changed: Rene.Avi@nextlayer.at 20120522
source: RIPE

% Information related to ‘81.16.155.0/24AS42829’

route: 81.16.155.0/24
descr: ONETWOTHREEPEOPLE-NET
descr: 123people Internetservices GmbH
origin: AS42829
mnt-by: AS1764-MNT
changed: Rene.Avi@nextlayer.at 20090825
changed: daniel.stricks@nextlayer.at 20100803
source: RIPE

% This query was served by the RIPE Database Query Service version 1.60.2 (WHOIS3)

DNS records
name class type data time to live
http://www.123people.com IN A 81.16.155.30 86400s (1.00:00:00)
123people.com IN TXT v=spf1 include:sendgrid.net ip4:81.16.155.0/24 mx a:mail.123people.com a:123people.com mx:123people.com include:123people.com ~all 3600s (01:00:00)
123people.com IN SOA
server: ns.nextlayer.at
email: hostmaster@nextlayer.at
serial: 2013031903
refresh: 1800
retry: 900
expire: 1209600
minimum ttl: 3600
86400s (1.00:00:00)
123people.com IN NS ns2.nextlayer.at 86400s (1.00:00:00)
123people.com IN NS ns.nextlayer.at 86400s (1.00:00:00)
123people.com IN A 81.16.155.30 86400s (1.00:00:00)
123people.com IN MX
preference: 200
exchange: mail2.i5invest.com
86400s (1.00:00:00)
123people.com IN MX
preference: 100
exchange: mail.123people.com
86400s (1.00:00:00)
30.155.16.81.in-addr.arpa IN PTR mail.123people.com 86400s (1.00:00:00)
155.16.81.in-addr.arpa IN SOA
server: ns.nextlayer.at
email: hostmaster@nextlayer.at
serial: 2012111501
refresh: 28800
retry: 14400
expire: 3600000
minimum ttl: 86400
86400s (1.00:00:00)
155.16.81.in-addr.arpa IN NS ns2.nextlayer.at 86400s (1.00:00:00)
155.16.81.in-addr.arpa IN NS ns.nextlayer.at 86400s (1.00:00:00)

— end —

http://i5invest.com/markus-wagner/

Brian Kerbs ~ KerbsOnSecurity Explains His Horrific Ordeal


It’s not often that one has the opportunity to be the target of a cyber and kinetic attack at the same time. But that is exactly what’s happened to me and my Web site over the past 24 hours. On Thursday afternoon, my site was the target of a fairly
English: A in Fairfax County, .

English: A in Fairfax County, . (Photo credit: Wikipedia)

massive denial of service attack. That attack was punctuated by a visit from a heavily armed local police unit that was tricked into responding to a 911 call spoofed to look like it came from my home.

Well, as one gamer enthusiast who follows me on Twitter remarked, I guess I’ve now “unlocked that level.”

Things began to get interesting early Thursday afternoon, when a technician from Prolexic, a company which protects Web sites (including KrebsOnSecurity.com) from denial-of-service attacks, forwarded a strange letter they’d received earlier in the day that appeared to have been sent from the FBI. The letter, a copy of which is reprinted in its entirety here, falsely stated that my site was hosting illegal content, profiting from cybercriminal activity, and that it should be shut down. Prolexic considered it a hoax, but forwarded it anyway. I similarly had no doubt it was a fake, and a short phone call to the FBI confirmed that fact.

Around the same time, my site came under a series of denial-of-service attacks, briefly knocking it offline. While Prolexic technicians worked to filter the attack traffic, I got busy tidying up the house (since we were expecting company for dinner). I heard the phone ring up in the office while I was downstairs vacuuming the living room and made a mental note to check my voicemail later. Vacuuming the rug near the front door, I noticed that some clear plastic tape I’d used to secure an extension cord for some outdoor lights was still straddling the threshold of the front door.

Fairfax County Police outside my home on 3/14/13

When I opened the door to peel the rest of the tape off, I heard someone yell, “Don’t move! Put your hands in the air.” Glancing up from my squat, I saw a Fairfax County Police officer leaning over the trunk of a squad car, both arms extended and pointing a handgun at me. As I very slowly turned my head to the left, I observed about a half-dozen other squad cars, lights flashing, and more officers pointing firearms in my direction, including a shotgun and a semi-automatic rifle. I was instructed to face the house, back down my front steps and walk backwards into the adjoining parking area, after which point I was handcuffed and walked up to the top of the street.

I informed the responding officers that this was a hoax, and that I’d even warned them in advance of this possibility. In August 2012, I filed a report with Fairfax County Police after receiving non-specific threats. The threats came directly after I wrote about a service called absoboot.com, which is a service that can be hired to knock Web sites offline.

One of the reasons that I opted to file the report was because I knew some of the young hackers who frequented the forum on which this service was advertised had discussed SWATting someone as a way of exacting revenge or merely having fun at the target’s expense. To my surprise, the officer who took my report said he had never heard of the phenomenon, but promised to read up on it.

One of the officers asked if it was okay to enter my house, and I said sure. Then an officer who was dressed more like a supervisor approached me and asked if I was the guy who had filed a police report about this eventuality about six months earlier. When I responded in the affirmative, he spoke into his handheld radio, and the police began stowing their rifles and the cuffs were removed from my wrists. He explained that they’d tried to call me on the phone number that had called them (my mobile), but that there was no answer. He apologized for the inconvenience, and said they were only doing their jobs. I told him no hard feelings. He told me that the problem of SWATting started on the West Coast and has been slowly making its way east.

The cop that took the report from me after the incident said someone had called 911 using a Caller ID number that matched my mobile phone number; the caller claimed to be me, reporting that Russians had broken into the home and shot my wife. Obviously, this was not the case, and nobody was harmed during the SWATing.

It’s difficult to believe the phony FBI letter that Prolexic received, the denial-of-service attack, and the SWATting were somehow the work of different individuals upset over something I’ve written. The letter to Prolexic made no fewer than five references to a story I published earlier this week about sssdob.ru, a site advertised in the cybercrime underground that sells access to Social Security numbers and credit reports. That story was prompted by news media attention to exposed.su, a site that has been posting what appear to be Social Security numbers, previous addresses and other information on highly public figures, including First Lady Michelle Obama and the director of the FBI.

Interestingly, there are strong indications that a site named booter.tw may have been involved in the denial-of-service attack on my site yesterday. For some bone-headed reason, the entire customer database file for booter.tw appears to be available for download if you happen to the know the link to the archive. A search through that record shows that on Thursday afternoon Eastern Time, someone paid booter.tw to launch a series of denial-of-service attacks against my Web site. The account that paid for the attack used the nickname “Starfall,” using the email address “starfall@gmail.com.”

Update, Mar. 16, 8:09 a.m. ET: It seems that I and several other folks who looked at the SQL file from booter.tw made the same mistake in misreading the table: The account that ordered the DDoS against KrebsOnSecurity.com was not Starfall but instead one that used the nickname “countonme,” and the email address “countonme@gmail.com.”

Full Story ~

Law Enforcement Affairs ~ lawenforcementaffairs.com

This individual Michael King aka Michael W. King aka Wayne Michael King aka Mike King aka MikeKingUSA and his BPO operators [Business Process Outsourceing] are a threat to society. His fascination with Law Enforcement and Guns pose a direct threat to us all.

His ONLINE ACTIVITIES SHOULD NOT GO UNNOTICED by AUTHORITIES in both Florida, North Carolina and the FEDS.

Sites We’ve Identified Associated With This Individual

  1. Potential Predators ~ potentialpredators.com
  2. The Online Predators Watch ~ theonline-watch.com
  3. Communication Unlimited ~ North Carolina
  4. Predators Watch ~ predatorswatch.com
  5. Elite Consulting Services USA ~ eliteconsultingservices.com
  6. Potential Prostitutes ~ potentialprostitutes.com
  7. Bad Renter Report ~ badrenterreport.com
  8. Mike King ~ MikeKingUSA.COM
  9. Wiki Warnings ~ wikiwarnings.com
  10. Warning Notice ~ warning-notice.com
  11. Omega Enterprises USA ~ omegaenterprisesusa.com
  12. Law Enforcement Association ~ lawenforcementassociation.com
  13. Warning Notice ~ warning-notice.com
  14. Reprenown.com
  15. Mike King Enterprises
  16. Law Enforcement Affairs ~ Lawenforcementaffairs.com
  17. Bad Renter Report ~ badrenterreport.com

lawenforcementaffairs

Related articles